Lookey here

Published: July 20, 2023

Description

Attackers hid the flag in a huge text dump. Download the file and grep for picoCTF to recover it.

Use grep to search for `pico` inside the file.

Trim leading whitespace and extract only the flag token.

grep pico anthem.flag.txt
grep pico anthem.flag.txt | sed -e 's/^ *//' | cut -d ' ' -f7

Solution

  1. Step 1Search with grep
    Even though the file is large, `grep pico anthem.flag.txt` immediately shows the flagged line.
    Learn more

    grep (Global Regular Expression Print) scans files line by line and prints any line matching a given pattern. It is highly optimized - grep on a modern system can scan gigabytes per second - making it far faster than manually scrolling through a large file or opening it in a text editor.

    Because grep uses regular expressions by default, you can search for patterns rather than literal strings. For example, grep -E 'picoCTF\{[A-Za-z0-9_]+\}' would match any properly formatted flag. For this challenge, the simple literal pico is sufficient and avoids the need to escape special characters.

    grep is one of the most-used tools in a security analyst's daily workflow: searching log files for IP addresses or error messages, hunting through code for dangerous function calls, and extracting patterns from large data dumps are all common use cases. Learning its flags (-i for case-insensitive, -r for recursive, -n for line numbers, -o for printing only the match) multiplies its utility significantly.

    For very large files - gigabyte-scale log dumps that might appear in forensics challenges - grep remains highly efficient because it reads line by line without loading the whole file into memory. If you need even faster searching on enormous datasets, ripgrep (rg) is a modern alternative that uses parallel threads and SIMD instructions to significantly outperform grep on multi-core systems.

    Context flags are useful when you find a match but need to understand surrounding content: -A 3 shows three lines after the match, -B 3 shows three before, and -C 3 shows three on each side. This is especially valuable in log analysis where the important information (e.g., an IP address or session ID) appears on the line before or after the keyword you searched for.

  2. Step 2Clean the output
    Use sed/cut to strip spaces and isolate the picoCTF string.
    Learn more

    sed -e 's/^ *//' is a regular expression substitution that removes leading whitespace: ^ anchors to the start of the line, * matches zero or more spaces, and the replacement is empty (deleted). This is a common cleanup step when text fields have inconsistent indentation.

    cut -d ' ' -f7 then selects the seventh space-delimited field, which is where the flag token falls in this particular line. The exact field number depends on the structure of the matched line - you would determine it by inspecting the raw grep output first. Alternatively, grep -o 'picoCTF{[^}]*}' uses the -o flag to print only the matching portion, which is often cleaner than field-counting.

    sed's substitution syntax (s/pattern/replacement/flags) is extremely versatile. The g flag replaces all occurrences on a line; the I flag (GNU sed) makes it case-insensitive. For multi-line transformations or more complex logic, awk is more appropriate - it processes each line as a record with fields, making it natural for structured output like log files and CSV data.

    In CTF forensics, "needle in a haystack" challenges like this one simulate realistic incident response work: a defender receives a massive log file or network capture and must locate the one line containing a malicious payload, exfiltrated secret, or attacker communication. Developing fast, reliable search patterns for common formats (IP addresses, Base64 strings, hex sequences, flag formats) directly translates to real-world blue team skills.

Flag

picoCTF{gr3p_15_@w3s0m3_2116...}

Classic grep exercise-useful reminder to search rather than scroll.

Want more picoCTF 2022 writeups?

Useful tools for Forensics

Related reading

What to try next